[infowarrior] - Security flaws on the rise, questions remain
http://www.theregister.co.uk/2006/01/09/computer_security_flaws_on_the_rise/ Security flaws on the rise, questions remain By Robert Lemos, SecurityFocus Published Monday 9th January 2006 21:38 GMT After three years of modest or no gains, the number of publicly reported vulnerabilities jumped in 2005, boosted by easy-to-find bugs in web applications. Yet, questions remain about the value of analyzing current databases, whose data rarely correlates easily. A survey of four major vulnerability databases found that the number of flaws counted by each in the past five years differed significantly. However, three of the four databases exhibited a relative plateau in the number of flaws publicly disclosed in 2002 through 2004. And, every database saw a significant increase in their count of the flaws disclosed in 2005. A few common themes emerged from the data as well. In 2005, easy-to-find flaws in web applications were likely responsible for the majority of the increase, the database managers said in interviews with SecurityFocus. However, some of the increase came from a doubling in the number of flaws released by large software companies. The most important, and perhaps obvious, lesson is that the software flaws are here to stay, said Peter Mell, a senior computer scientist for the National Institute of Standards and Technology (NIST) and the creator of the National Vulnerability Database (NVD) (http://nvd.nist.gov/), one of the four databases surveyed. The problem of people breaking into computers is not going away any time soon, Mell said. There is certainly more patches every year that system administrators need to install, but the caveat is that more vulnerabilities seem to apply to less important software. Vulnerability databases are coming of age. In 2005, NIST created the National Vulnerability Database (http://www.securityfocus.com/news/11278) and software makers and security service providers have cooperated to create the Common Vulnerability Scoring System (CVSS) (http://www.securityfocus.com/news/10541), a standardized measure of the severity of software flaws. The National Vulnerability Database completed scoring flaws (http://www.securityfocus.com/news/11360) in its database using the CVSS in late November. While auctions of vulnerability research have not taken off (http://www.securityfocus.com/news/11364), two companies now buy vulnerability information (http://www.securityfocus.com/news/11253) from flaw finders. Four databases were surveyed: The Computer Emergency Response Team (CERT) Coordination Center's database, the National Vulnerability Database (NVD), the Open-Source Vulnerability Database (OSVDB), and the Symantec Vulnerability Database. (SecurityFocus is owned by Symantec.) The number of flaws cataloged by each database in 2005 varied widely, because of differing definitions of what constitutes a vulnerability and differing editorial policy. The OSVDB (http://www.osvdb.org/) - which counted the highest number of flaws in 2005 at 7,187 - breaks down vulnerabilities into their component parts, so what another database might classify as one flaw might be assigned multiple entries. SecurityFocus (http://www.securityfocus.com/bid) had the lowest count of the vulnerabilities at 3,766. The variations in editorial policy and lack of cross-referencing between databases as well as unmeasurable biases in the research community and disclosure policy mean that the databases - or refined vulnerability information (RVI) sources - do not produce statistics that can be meaningfully compared, Steve Christey, the editor of the Common Vulnerability and Exposures (CVE) (http://cve.mitre.org/), wrote in an e-mail to security mailing lists (http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0135.html) on Thursday. The CVE is a dictionary of security issues compiled by The MITRE Corp., a government contractor and nonprofit organization. In my opinion, RVI sources are still a year or two away from being able to produce reliable, repeatable, and comparable statistics, he wrote. In general, consumers should treat current statistics as suggestive, not conclusive. Recent numbers produced by the U.S. Computer Emergency Readiness Team (US-CERT) revealed some of the problems with refined vulnerability sources. Managed by the CERT Coordination Center, the US-CERT's security bulletins outline security issues but are updated each week. In a year end list published last week, the US-CERT announced that 5,198 vulnerabilities had been reported in 2005. Some mainstream media outlets noted the number (http://blogs.washingtonpost.com/securityfix/2005/12/uscert_5198_sof.html), compared it to the CERT Coordination Center's previous data - which is compiled from a different set of vulnerability reports - and concluded there was a 38 per cent increase in vulnerabilities in 2005 over the previous year. In fact, discounting the updated reports resulted in a 41 per cent decrease to 3,074 vulnerabilities,
[infowarrior] - Security flaws on the rise, questions remain
Security flaws on the rise, questions remain Robert Lemos, SecurityFocus 2006-01-05 http://www.securityfocus.com/news/11367?ref=rss After three years of modest or no gains, the number of publicly reported vulnerabilities jumped in 2005, boosted by easy-to-find bugs in Web applications. Yet, questions remain about the value of analyzing current databases, whose data rarely correlates easily. A survey of four major vulnerability databases found that the number of flaws counted by each in the past five years differed significantly. However, three of the four databases exhibited a relative plateau in the number of flaws publicly disclosed in 2002 through 2004. And, every database saw a significant increase in their count of the flaws disclosed in 2005. A few common themes emerged from the data as well. In 2005, easy-to-find flaws in Web applications were likely responsible for the majority of the increase, the database managers said in interviews with SecurityFocus. However, some of the increase came from a doubling in the number of flaws released by large software companies. The most important, and perhaps obvious, lesson is that the software flaws are here to stay, said Peter Mell, a senior computer scientist for the National Institute of Standards and Technology (NIST) and the creator of the National Vulnerability Database (NVD), one of the four databases surveyed. The problem of people breaking into computers is not going away any time soon, Mell said. There is certainly more patches every year that system administrators need to install, but the caveat is that more vulnerabilities seem to apply to less important software. Vulnerability databases are coming of age. In 2005, NIST created the National Vulnerability Database and software makers and security service providers have cooperated to create the Common Vulnerability Scoring System (CVSS) to create a measure of severity of software flaws. The National Vulnerability Database completed scoring flaws in its database using the CVSS in late November. While auctions of vulnerability research have not taken off, two companies now buy vulnerability information from flaw finders. The survey focused on four databases: The Computer Emergency Response Team (CERT) Coordination Center's database, National Vulnerability Database (NVD), the Open-Source Vulnerability Database (OSVDB), and the Symantec Vulnerability Database. (SecurityFocus is owned by Symantec.) The number of flaws cataloged by each database in 2005 varied widely, because of differing definitions of what constitutes a vulnerability and differing editorial policy. The OSVDB--which counted the highest number of flaws in 2005 at 7,187--breaks down vulnerabilities into their component parts, so what another database might classify as one flaw might be assigned multiple entries. SecurityFocus had the lowest count of the vulnerabilities at 3,766. The variations in editorial policy and lack of cross-referencing between databases and unmeasurable biases in the research community and disclosure policy mean that the databases--or refined vulnerability information (RVI) sources--do not produce statistics that can be compared, Steve Christey, the editor of the Common Vulnerability and Exposures (CVE), wrote in an e-mail to security mailing lists on Thursday. The CVE is a dictionary of security issues compiled by The MITRE Corp., a government contractor and nonprofit organization. In my opinion, RVI sources are still a year or two away from being able to produce reliable, repeatable, and comparable statistics, he wrote. In general, consumers should treat current statistics as suggestive, not conclusive. Recent numbers produced by the U.S. Computer Emergency Readiness Team (US-CERT) revealed some of the problems with refined vulnerability sources. Managed by the CERT Coordination Center, the US-CERT's security bulletins outline security issues but are updated each week. In a year end list published last week, the US-CERT announced that 5,198 vulnerabilities had been reported in 2005. Some mainstream media outlets noted the number, compared it to the CERT Coordination Center's previous data--which is compiled from a different set of vulnerability reports--and concluded there was a 38 percent increase in vulnerabilities in 2005 over the previous year. In fact, discounting the updated reports resulted in a 41 percent decrease to 3,074 vulnerabilities, according to an analysis done by Alan Wyle, an independent computer programmer. If the data point could be compared with statistics from CERT/CC, that would have placed the number of flaws reported in line with the previous three years. Yet, while the data is significantly flawed, the original story told by US-CERT's list seems to be the right one. The number of vulnerabilities reported in 2005 increased, mainly due to researchers looking into the security of Web applications. The National Vulnerability Database noted the largest increase of 96 percent from